Cyber Security

An important part of our CyberSAINTTM security platform is our FREE training. All DCG clients enjoy a new training method that you can leverage to better train and prepare your employees for social engineered cyber-attacks. The training is simple and fast, yet covers topics that will keep them safe. Are you onboarding new employees? ‘Get them trained and stay safe with DCG’s CyberSAINT FREE security training.

Contact Us

Forward thinking, and agile small businesses who need to leverage Information technology to beat their competitors count on DCG. DCG exists to help their clients choose, deploy, and manage proven technologies that achieve worry free, always on IT infrastructure.

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who had their accounts hacked. This is not meant to scare you, but to make you aware that cloud security needs to be taken seriously especially if you’re a business owner. To help you make a smooth and safe transition, we’ve put together a list of precautionary measures you can take to ensure cloud security.

Ask your IT provider what cloud security policies they have in place

This is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.

Ask where the physical cloud servers are located

When you have “the conversation,” don’t forget to ask about this. Believe it or not, some cloud servers may not even be located in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center with proper security afforded to them.

Create unique usernames and passwords

Your login credentials represent one of the cloud’s main security vulnerabilities. Think of a better password than “12345” or “football.”

Use industry standard encryption and authentication protocols

IPsec (Internet Protocol Security) is a reliable technology choice.

Encrypt data before it’s uploaded to the cloud

Encryption is a must, and can be done by you or your cloud service provider. Should hackers manage to access your data, they’ll find it useless because they can’t make heads or tails of it.

When it comes to trusting the security protocol of a cloud service provider, transparency is key. They should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, that’s a red flag telling you to find another vendor.

Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.